mirror of
https://github.com/mtrojnar/osslsigncode.git
synced 2025-04-05 09:08:04 -05:00
Get Certificate Revocation List from a CRL distribution point
This commit is contained in:
parent
7bfe3b5db9
commit
3d7b8d2a21
2
NEWS.md
2
NEWS.md
@ -2,6 +2,8 @@
|
|||||||
|
|
||||||
### 2.6 (unreleased)
|
### 2.6 (unreleased)
|
||||||
|
|
||||||
|
- get Certificate Revocation List from a CRL distribution point
|
||||||
|
|
||||||
### 2.5 (2022.08.12)
|
### 2.5 (2022.08.12)
|
||||||
|
|
||||||
- fixed the Unix executable install path
|
- fixed the Unix executable install path
|
||||||
|
296
osslsigncode.c
296
osslsigncode.c
@ -280,23 +280,6 @@ static size_t curl_write(void *ptr, size_t sz, size_t nmemb, void *stream)
|
|||||||
return written;
|
return written;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* [in] url: URL of the Time-Stamp Authority server
|
|
||||||
* [in] http_code: curlinfo response code
|
|
||||||
* [returns] none
|
|
||||||
*/
|
|
||||||
static void print_timestamp_error(const char *url, long http_code)
|
|
||||||
{
|
|
||||||
if (http_code != -1) {
|
|
||||||
printf("Failed to convert timestamp reply from %s; "
|
|
||||||
"HTTP status %ld\n", url, http_code);
|
|
||||||
} else {
|
|
||||||
printf("Failed to convert timestamp reply from %s; "
|
|
||||||
"no HTTP status available", url);
|
|
||||||
}
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
A timestamp request looks like this:
|
A timestamp request looks like this:
|
||||||
|
|
||||||
@ -423,15 +406,15 @@ static BIO *bio_encode_authenticode_request(PKCS7 *p7)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Decode a curl response from BIO.
|
* Decode a RFC 3161 response from BIO.
|
||||||
* If successful the RFC 3161 timestamp will be written into
|
* If successful the RFC 3161 timestamp will be written into
|
||||||
* the PKCS7 SignerInfo structure as an unauthorized attribute - cont[1].
|
* the PKCS7 SignerInfo structure as an unauthorized attribute - cont[1].
|
||||||
* [in, out] p7: new PKCS#7 signature
|
* [in, out] p7: new PKCS#7 signature
|
||||||
* [in] bin: BIO with curl data
|
* [in] bin: BIO with http data
|
||||||
* [in] verbose: additional output mode
|
* [in] verbose: additional output mode
|
||||||
* [returns] CURLcode on error or CURLE_OK (0) on success
|
* [returns] 1 on error or 0 on success
|
||||||
*/
|
*/
|
||||||
static CURLcode decode_rfc3161_response(PKCS7 *p7, BIO *bin, int verbose)
|
static int decode_rfc3161_response(PKCS7 *p7, BIO *bin, int verbose)
|
||||||
{
|
{
|
||||||
PKCS7_SIGNER_INFO *si;
|
PKCS7_SIGNER_INFO *si;
|
||||||
STACK_OF(X509_ATTRIBUTE) *attrs;
|
STACK_OF(X509_ATTRIBUTE) *attrs;
|
||||||
@ -447,7 +430,6 @@ static CURLcode decode_rfc3161_response(PKCS7 *p7, BIO *bin, int verbose)
|
|||||||
return 1; /* FAILED */
|
return 1; /* FAILED */
|
||||||
|
|
||||||
reply = ASN1_item_d2i_bio(ASN1_ITEM_rptr(TimeStampResp), bin, NULL);
|
reply = ASN1_item_d2i_bio(ASN1_ITEM_rptr(TimeStampResp), bin, NULL);
|
||||||
BIO_free_all(bin);
|
|
||||||
if (!reply || !reply->status)
|
if (!reply || !reply->status)
|
||||||
return 1; /* FAILED */
|
return 1; /* FAILED */
|
||||||
if (ASN1_INTEGER_get(reply->status->status) != 0) {
|
if (ASN1_INTEGER_get(reply->status->status) != 0) {
|
||||||
@ -483,41 +465,37 @@ static CURLcode decode_rfc3161_response(PKCS7 *p7, BIO *bin, int verbose)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Decode a curl response from BIO.
|
* Decode an authenticode response from BIO.
|
||||||
* If successful the authenticode timestamp will be written into
|
* If successful the authenticode timestamp will be written into
|
||||||
* the PKCS7 SignerInfo structure as an unauthorized attribute - cont[1]:
|
* the PKCS7 SignerInfo structure as an unauthorized attribute - cont[1]:
|
||||||
* p7->d.sign->signer_info->unauth_attr
|
* p7->d.sign->signer_info->unauth_attr
|
||||||
* [in, out] p7: new PKCS#7 signature
|
* [in, out] p7: new PKCS#7 signature
|
||||||
* [in] bin: BIO with curl data
|
* [in] bin: base64 BIO with http data
|
||||||
* [in] verbose: additional output mode
|
* [in] verbose: additional output mode
|
||||||
* [returns] CURLcode on error or CURLE_OK (0) on success
|
* [returns] 1 on error or 0 on success
|
||||||
*/
|
*/
|
||||||
static CURLcode decode_authenticode_response(PKCS7 *p7, BIO *bin, int verbose)
|
static int decode_authenticode_response(PKCS7 *p7, BIO *b64_bin, int verbose)
|
||||||
{
|
{
|
||||||
PKCS7 *resp;
|
PKCS7 *resp;
|
||||||
PKCS7_SIGNER_INFO *info, *si;
|
PKCS7_SIGNER_INFO *info, *si;
|
||||||
STACK_OF(X509_ATTRIBUTE) *attrs;
|
STACK_OF(X509_ATTRIBUTE) *attrs;
|
||||||
BIO* b64, *b64_bin;
|
|
||||||
u_char *p;
|
u_char *p;
|
||||||
int len, i;
|
int len, i;
|
||||||
STACK_OF(PKCS7_SIGNER_INFO) *signer_info;
|
STACK_OF(PKCS7_SIGNER_INFO) *signer_info;
|
||||||
|
|
||||||
b64 = BIO_new(BIO_f_base64());
|
|
||||||
if (!blob_has_nl)
|
|
||||||
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
|
|
||||||
b64_bin = BIO_push(b64, bin);
|
|
||||||
resp = d2i_PKCS7_bio(b64_bin, NULL);
|
resp = d2i_PKCS7_bio(b64_bin, NULL);
|
||||||
BIO_free_all(b64_bin);
|
if (!resp) {
|
||||||
if (resp == NULL)
|
|
||||||
return 1; /* FAILED */
|
return 1; /* FAILED */
|
||||||
|
}
|
||||||
for(i = sk_X509_num(resp->d.sign->cert)-1; i>=0; i--)
|
for(i = sk_X509_num(resp->d.sign->cert)-1; i>=0; i--) {
|
||||||
PKCS7_add_certificate(p7, sk_X509_value(resp->d.sign->cert, i));
|
PKCS7_add_certificate(p7, sk_X509_value(resp->d.sign->cert, i));
|
||||||
|
}
|
||||||
signer_info = PKCS7_get_signer_info(resp);
|
signer_info = PKCS7_get_signer_info(resp);
|
||||||
|
if (!signer_info) {
|
||||||
PKCS7_free(resp);
|
PKCS7_free(resp);
|
||||||
if (!signer_info)
|
|
||||||
return 1; /* FAILED */
|
return 1; /* FAILED */
|
||||||
|
}
|
||||||
info = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
info = sk_PKCS7_SIGNER_INFO_value(signer_info, 0);
|
||||||
if (!info) {
|
if (!info) {
|
||||||
PKCS7_free(resp);
|
PKCS7_free(resp);
|
||||||
@ -555,50 +533,43 @@ static CURLcode decode_authenticode_response(PKCS7 *p7, BIO *bin, int verbose)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Add timestamp to the PKCS7 SignerInfo structure:
|
* Get data from HTTP server.
|
||||||
* sig->d.sign->signer_info->unauth_attr
|
* [out] http_code: HTTP status
|
||||||
* [in, out] p7: new PKCS#7 signature
|
* [in] url: URL of the CRL distribution point or Time-Stamp Authority HTTP server
|
||||||
* [in] ctx: structure holds input and output data
|
* [in] bout: timestamp request
|
||||||
* [in] url: URL of the Time-Stamp Authority server
|
* [in] proxy: proxy to getting the timestamp through
|
||||||
* [in] rfc3161: Authenticode / RFC3161 Timestamp switch
|
* [in] noverifypeer: do not verify the Time-Stamp Authority's SSL certificate
|
||||||
* [returns] 1 on error or 0 on success
|
* [in] verbose: additional output mode
|
||||||
|
* [in] content: CRL distribution point (0), RFC3161 TSA (1), Authenticode TSA (2)
|
||||||
|
* [returns] pointer to BIO with X509 Certificate Revocation List
|
||||||
*/
|
*/
|
||||||
static int add_timestamp(PKCS7 *p7, FILE_FORMAT_CTX *ctx, char *url, int rfc3161)
|
static BIO *bio_get_http(long *http_code, char *url, BIO *bout, char *proxy,
|
||||||
|
int noverifypeer, int verbose, int content)
|
||||||
{
|
{
|
||||||
CURL *curl;
|
CURL *curl;
|
||||||
struct curl_slist *slist = NULL;
|
struct curl_slist *slist = NULL;
|
||||||
CURLcode res;
|
CURLcode res;
|
||||||
BIO *bout, *bin;
|
BIO *bin;
|
||||||
u_char *p = NULL;
|
u_char *p = NULL;
|
||||||
long len = 0;
|
long len = 0;
|
||||||
int verbose = ctx->options->verbose || ctx->options->ntsurl == 1;
|
|
||||||
|
|
||||||
if (!url)
|
if (!url) {
|
||||||
return 1; /* FAILED */
|
return NULL; /* FAILED */
|
||||||
|
|
||||||
/* Encode timestamp request */
|
|
||||||
if (rfc3161) {
|
|
||||||
bout = bio_encode_rfc3161_request(p7, ctx->options->md);
|
|
||||||
} else {
|
|
||||||
bout = bio_encode_authenticode_request(p7);
|
|
||||||
}
|
}
|
||||||
if (!bout)
|
|
||||||
return 1; /* FAILED */
|
|
||||||
|
|
||||||
/* Start a libcurl easy session and set options for a curl easy handle */
|
/* Start a libcurl easy session and set options for a curl easy handle */
|
||||||
curl = curl_easy_init();
|
curl = curl_easy_init();
|
||||||
if (ctx->options->proxy) {
|
if (proxy) {
|
||||||
res = curl_easy_setopt(curl, CURLOPT_PROXY, ctx->options->proxy);
|
res = curl_easy_setopt(curl, CURLOPT_PROXY, proxy);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
}
|
}
|
||||||
if (!strncmp("http:", ctx->options->proxy, 5)) {
|
if (!strncmp("http:", proxy, 5)) {
|
||||||
res = curl_easy_setopt(curl, CURLOPT_PROXYTYPE, CURLPROXY_HTTP);
|
res = curl_easy_setopt(curl, CURLOPT_PROXYTYPE, CURLPROXY_HTTP);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (!strncmp("socks:", ctx->options->proxy, 6)) {
|
if (!strncmp("socks:", proxy, 6)) {
|
||||||
res = curl_easy_setopt(curl, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
|
res = curl_easy_setopt(curl, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
@ -613,27 +584,29 @@ static int add_timestamp(PKCS7 *p7, FILE_FORMAT_CTX *ctx, char *url, int rfc3161
|
|||||||
* ask libcurl to show us the verbose output
|
* ask libcurl to show us the verbose output
|
||||||
* curl_easy_setopt(curl, CURLOPT_VERBOSE, 42);
|
* curl_easy_setopt(curl, CURLOPT_VERBOSE, 42);
|
||||||
*/
|
*/
|
||||||
if (ctx->options->noverifypeer) {
|
if (noverifypeer) {
|
||||||
res = curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
res = curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if (content == 1) {
|
||||||
if (rfc3161) {
|
/* RFC3161 Timestamp */
|
||||||
slist = curl_slist_append(slist, "Content-Type: application/timestamp-query");
|
slist = curl_slist_append(slist, "Content-Type: application/timestamp-query");
|
||||||
slist = curl_slist_append(slist, "Accept: application/timestamp-reply");
|
slist = curl_slist_append(slist, "Accept: application/timestamp-reply");
|
||||||
} else {
|
} else if (content == 2) {
|
||||||
|
/* Authenticode Timestamp */
|
||||||
slist = curl_slist_append(slist, "Content-Type: application/octet-stream");
|
slist = curl_slist_append(slist, "Content-Type: application/octet-stream");
|
||||||
slist = curl_slist_append(slist, "Accept: application/octet-stream");
|
slist = curl_slist_append(slist, "Accept: application/octet-stream");
|
||||||
}
|
}
|
||||||
|
if (content > 0) {
|
||||||
|
/* Timestamp */
|
||||||
slist = curl_slist_append(slist, "User-Agent: Transport");
|
slist = curl_slist_append(slist, "User-Agent: Transport");
|
||||||
slist = curl_slist_append(slist, "Cache-Control: no-cache");
|
slist = curl_slist_append(slist, "Cache-Control: no-cache");
|
||||||
res = curl_easy_setopt(curl, CURLOPT_HTTPHEADER, slist);
|
res = curl_easy_setopt(curl, CURLOPT_HTTPHEADER, slist);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
}
|
}
|
||||||
|
|
||||||
len = BIO_get_mem_data(bout, &p);
|
len = BIO_get_mem_data(bout, &p);
|
||||||
res = curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, len);
|
res = curl_easy_setopt(curl, CURLOPT_POSTFIELDSIZE, len);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
@ -643,13 +616,13 @@ static int add_timestamp(PKCS7 *p7, FILE_FORMAT_CTX *ctx, char *url, int rfc3161
|
|||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
}
|
}
|
||||||
|
|
||||||
bin = BIO_new(BIO_s_mem());
|
|
||||||
BIO_set_mem_eof_return(bin, 0);
|
|
||||||
res = curl_easy_setopt(curl, CURLOPT_POST, 1);
|
res = curl_easy_setopt(curl, CURLOPT_POST, 1);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
bin = BIO_new(BIO_s_mem());
|
||||||
|
BIO_set_mem_eof_return(bin, 0);
|
||||||
res = curl_easy_setopt(curl, CURLOPT_WRITEDATA, bin);
|
res = curl_easy_setopt(curl, CURLOPT_WRITEDATA, bin);
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
@ -661,28 +634,85 @@ static int add_timestamp(PKCS7 *p7, FILE_FORMAT_CTX *ctx, char *url, int rfc3161
|
|||||||
/* Perform the request */
|
/* Perform the request */
|
||||||
res = curl_easy_perform(curl);
|
res = curl_easy_perform(curl);
|
||||||
curl_slist_free_all(slist);
|
curl_slist_free_all(slist);
|
||||||
BIO_free_all(bout);
|
|
||||||
|
|
||||||
if (res != CURLE_OK) {
|
if (res != CURLE_OK) {
|
||||||
BIO_free_all(bin);
|
BIO_free_all(bin);
|
||||||
if (verbose)
|
if (verbose)
|
||||||
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
|
curl_easy_cleanup(curl);
|
||||||
|
return NULL; /* FAILED */
|
||||||
} else {
|
} else {
|
||||||
/* CURLE_OK (0) */
|
/* CURLE_OK (0) */
|
||||||
long http_code = -1;
|
|
||||||
(void)BIO_flush(bin);
|
(void)BIO_flush(bin);
|
||||||
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &http_code);
|
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &http_code);
|
||||||
/* Decode a curl response from BIO and write it into the PKCS7 structure */
|
|
||||||
if (rfc3161)
|
|
||||||
res = decode_rfc3161_response(p7, bin, verbose);
|
|
||||||
else
|
|
||||||
res = decode_authenticode_response(p7, bin, verbose);
|
|
||||||
if (res && verbose)
|
|
||||||
print_timestamp_error(url, http_code);
|
|
||||||
}
|
}
|
||||||
/* End a libcurl easy handle */
|
/* End a libcurl easy handle */
|
||||||
curl_easy_cleanup(curl);
|
curl_easy_cleanup(curl);
|
||||||
return (int)res;
|
return bin;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Decode a curl response from BIO and write it into the PKCS7 structure
|
||||||
|
* Add timestamp to the PKCS7 SignerInfo structure:
|
||||||
|
* sig->d.sign->signer_info->unauth_attr
|
||||||
|
* [in, out] p7: new PKCS#7 signature
|
||||||
|
* [in] ctx: structure holds input and output data
|
||||||
|
* [in] url: URL of the Time-Stamp Authority server
|
||||||
|
* [in] rfc3161: Authenticode / RFC3161 Timestamp switch
|
||||||
|
* [returns] 1 on error or 0 on success
|
||||||
|
*/
|
||||||
|
static int add_timestamp(PKCS7 *p7, FILE_FORMAT_CTX *ctx, char *url, int rfc3161)
|
||||||
|
{
|
||||||
|
BIO *bout, *bin;
|
||||||
|
int verbose = ctx->options->verbose || ctx->options->ntsurl == 1;
|
||||||
|
int res = 1;
|
||||||
|
long http_code = -1;
|
||||||
|
|
||||||
|
/* Encode timestamp request */
|
||||||
|
if (rfc3161) {
|
||||||
|
bout = bio_encode_rfc3161_request(p7, ctx->options->md);
|
||||||
|
} else {
|
||||||
|
bout = bio_encode_authenticode_request(p7);
|
||||||
|
}
|
||||||
|
if (!bout) {
|
||||||
|
return 1; /* FAILED */
|
||||||
|
}
|
||||||
|
if (rfc3161) {
|
||||||
|
bin = bio_get_http(&http_code, url, bout, ctx->options->proxy,
|
||||||
|
ctx->options->noverifypeer, verbose, 1);
|
||||||
|
} else {
|
||||||
|
bin = bio_get_http(&http_code, url, bout, ctx->options->proxy,
|
||||||
|
ctx->options->noverifypeer, verbose, 2);
|
||||||
|
}
|
||||||
|
BIO_free_all(bout);
|
||||||
|
|
||||||
|
if (!bin) {
|
||||||
|
if (verbose)
|
||||||
|
printf("CURL failure: %s %s\n", curl_easy_strerror(res), url);
|
||||||
|
} else {
|
||||||
|
if (rfc3161) {
|
||||||
|
res = decode_rfc3161_response(p7, bin, verbose);
|
||||||
|
BIO_free_all(bin);
|
||||||
|
} else {
|
||||||
|
BIO *b64 = BIO_new(BIO_f_base64());
|
||||||
|
if (!blob_has_nl)
|
||||||
|
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
|
||||||
|
BIO *b64_bin = BIO_push(b64, bin);
|
||||||
|
res = decode_authenticode_response(p7, b64_bin, verbose);
|
||||||
|
BIO_free_all(b64_bin);
|
||||||
|
}
|
||||||
|
if (res && verbose) {
|
||||||
|
if (http_code != -1) {
|
||||||
|
printf("Failed to convert timestamp reply from %s; "
|
||||||
|
"HTTP status %ld\n", url, http_code);
|
||||||
|
} else {
|
||||||
|
printf("Failed to convert timestamp reply from %s; "
|
||||||
|
"no HTTP status available", url);
|
||||||
|
}
|
||||||
|
ERR_print_errors_fp(stdout);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -1069,6 +1099,57 @@ out:
|
|||||||
return url;
|
return url;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Get Certificate Revocation List from a CRL distribution point
|
||||||
|
* and write it into the X509_CRL structure.
|
||||||
|
* [in] url: URL of the CRL distribution point server
|
||||||
|
* [returns] X509 Certificate Revocation List
|
||||||
|
*/
|
||||||
|
static X509_CRL *x509_crl_get(char *url)
|
||||||
|
{
|
||||||
|
X509_CRL *crl;
|
||||||
|
BIO *bio;
|
||||||
|
long http_code = -1;
|
||||||
|
|
||||||
|
bio = bio_get_http(&http_code, url, NULL, NULL, 0, 1, 0);
|
||||||
|
if (!bio) {
|
||||||
|
printf("Warning: Faild to get CRL from %s\n\n", url);
|
||||||
|
return NULL; /* FAILED */
|
||||||
|
}
|
||||||
|
crl = d2i_X509_CRL_bio(bio, NULL);
|
||||||
|
BIO_free_all(bio);
|
||||||
|
if (!crl) {
|
||||||
|
printf("Warning: Faild to decode CRL from %s\n\n", url);
|
||||||
|
return NULL; /* FAILED */
|
||||||
|
}
|
||||||
|
return crl; /* OK */
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Create CRLs from p7->d.sign->crl and x509_CRL (from CRL distribution point).
|
||||||
|
* [in] p7: PKCS#7 signature
|
||||||
|
* [in] crl: X509 Certificate Revocation List
|
||||||
|
* [returns] X509 Certificate Revocation Lists (CRLs)
|
||||||
|
*/
|
||||||
|
static STACK_OF(X509_CRL) *x509_crl_list_get(PKCS7 *p7, X509_CRL *crl)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
STACK_OF(X509_CRL) *crls = sk_X509_CRL_new_null();
|
||||||
|
|
||||||
|
for (i = 0; i < sk_X509_CRL_num(p7->d.sign->crl); i++) {
|
||||||
|
if (!sk_X509_CRL_push(crls, sk_X509_CRL_value(p7->d.sign->crl, i))) {
|
||||||
|
sk_X509_CRL_pop_free(crls, X509_CRL_free);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (crl && !sk_X509_CRL_push(crls, crl)) {
|
||||||
|
sk_X509_CRL_pop_free(crls, X509_CRL_free);
|
||||||
|
X509_CRL_free(crl);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
return crls;
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Compare the hash provided from the TSTInfo object against the hash computed
|
* Compare the hash provided from the TSTInfo object against the hash computed
|
||||||
* from the signature created by the signing certificate's private key
|
* from the signature created by the signing certificate's private key
|
||||||
@ -1141,7 +1222,7 @@ static int verify_timestamp_token(PKCS7 *p7, CMS_ContentInfo *timestamp)
|
|||||||
* [in] p7: PKCS#7 signature
|
* [in] p7: PKCS#7 signature
|
||||||
* [in] timestamp: CMS_ContentInfo struct for Authenticode Timestamp or RFC 3161 Timestamp
|
* [in] timestamp: CMS_ContentInfo struct for Authenticode Timestamp or RFC 3161 Timestamp
|
||||||
* [in] time: timestamp verification time
|
* [in] time: timestamp verification time
|
||||||
* [returns] 1 on error or 0 on success
|
* [returns] 0 on error or 1 on success
|
||||||
*/
|
*/
|
||||||
static int verify_timestamp(FILE_FORMAT_CTX *ctx, PKCS7 *p7, CMS_ContentInfo *timestamp, time_t time)
|
static int verify_timestamp(FILE_FORMAT_CTX *ctx, PKCS7 *p7, CMS_ContentInfo *timestamp, time_t time)
|
||||||
{
|
{
|
||||||
@ -1149,7 +1230,8 @@ static int verify_timestamp(FILE_FORMAT_CTX *ctx, PKCS7 *p7, CMS_ContentInfo *ti
|
|||||||
STACK_OF(CMS_SignerInfo) *sinfos;
|
STACK_OF(CMS_SignerInfo) *sinfos;
|
||||||
CMS_SignerInfo *cmssi;
|
CMS_SignerInfo *cmssi;
|
||||||
X509 *signer;
|
X509 *signer;
|
||||||
STACK_OF(X509_CRL) *crls;
|
X509_CRL *crl = NULL;
|
||||||
|
STACK_OF(X509_CRL) *crls = NULL;
|
||||||
char *url;
|
char *url;
|
||||||
int verok = 0;
|
int verok = 0;
|
||||||
|
|
||||||
@ -1189,18 +1271,32 @@ static int verify_timestamp(FILE_FORMAT_CTX *ctx, PKCS7 *p7, CMS_ContentInfo *ti
|
|||||||
cmssi = sk_CMS_SignerInfo_value(sinfos, 0);
|
cmssi = sk_CMS_SignerInfo_value(sinfos, 0);
|
||||||
CMS_SignerInfo_get0_algs(cmssi, NULL, &signer, NULL, NULL);
|
CMS_SignerInfo_get0_algs(cmssi, NULL, &signer, NULL, NULL);
|
||||||
|
|
||||||
|
/* verify a Certificate Revocation List */
|
||||||
url = clrdp_url_get_x509(signer);
|
url = clrdp_url_get_x509(signer);
|
||||||
|
#ifdef ENABLE_CURL
|
||||||
if (url) {
|
if (url) {
|
||||||
printf("TSA's CRL distribution point: %s\n", url);
|
printf("TSA's CRL distribution point: %s\n", url);
|
||||||
|
crl = x509_crl_get(url);
|
||||||
OPENSSL_free(url);
|
OPENSSL_free(url);
|
||||||
|
if (!crl && !ctx->options->tsa_crlfile) {
|
||||||
|
printf("Use the \"-TSA-CRLfile\" option to add one or more Time-Stamp Authority CRLs in PEM format.\n\n");
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif /* ENABLE_CURL */
|
||||||
|
if (p7->d.sign->crl || crl) {
|
||||||
|
crls = x509_crl_list_get(p7, crl);
|
||||||
|
if (!crls) {
|
||||||
|
printf("Failed to use CRL distribution point\n");
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
/* verify a Certificate Revocation List */
|
|
||||||
crls = p7->d.sign->crl;
|
|
||||||
if (ctx->options->tsa_crlfile || crls) {
|
if (ctx->options->tsa_crlfile || crls) {
|
||||||
STACK_OF(X509) *chain = CMS_get1_certs(timestamp);
|
STACK_OF(X509) *chain = CMS_get1_certs(timestamp);
|
||||||
int crlok = verify_crl(ctx->options->tsa_cafile, ctx->options->tsa_crlfile,
|
int crlok = verify_crl(ctx->options->tsa_cafile, ctx->options->tsa_crlfile,
|
||||||
crls, signer, chain);
|
crls, signer, chain);
|
||||||
sk_X509_pop_free(chain, X509_free);
|
sk_X509_pop_free(chain, X509_free);
|
||||||
|
sk_X509_CRL_pop_free(crls, X509_CRL_free);
|
||||||
printf("Timestamp Server Signature CRL verification: %s\n", crlok ? "ok" : "failed");
|
printf("Timestamp Server Signature CRL verification: %s\n", crlok ? "ok" : "failed");
|
||||||
if (!crlok)
|
if (!crlok)
|
||||||
goto out;
|
goto out;
|
||||||
@ -1233,9 +1329,11 @@ out:
|
|||||||
static int verify_authenticode(FILE_FORMAT_CTX *ctx, PKCS7 *p7, time_t time, X509 *signer)
|
static int verify_authenticode(FILE_FORMAT_CTX *ctx, PKCS7 *p7, time_t time, X509 *signer)
|
||||||
{
|
{
|
||||||
X509_STORE *store;
|
X509_STORE *store;
|
||||||
STACK_OF(X509_CRL) *crls;
|
X509_CRL *crl = NULL;
|
||||||
|
STACK_OF(X509_CRL) *crls = NULL;
|
||||||
BIO *bio = NULL;
|
BIO *bio = NULL;
|
||||||
int verok = 0;
|
int verok = 0;
|
||||||
|
char *url;
|
||||||
|
|
||||||
store = X509_STORE_new();
|
store = X509_STORE_new();
|
||||||
if (!store)
|
if (!store)
|
||||||
@ -1286,16 +1384,34 @@ static int verify_authenticode(FILE_FORMAT_CTX *ctx, PKCS7 *p7, time_t time, X50
|
|||||||
BIO_free(bio);
|
BIO_free(bio);
|
||||||
|
|
||||||
/* verify a Certificate Revocation List */
|
/* verify a Certificate Revocation List */
|
||||||
crls = p7->d.sign->crl;
|
url = clrdp_url_get_x509(signer);
|
||||||
|
#ifdef ENABLE_CURL
|
||||||
|
if (url) {
|
||||||
|
printf("CRL distribution point: %s\n", url);
|
||||||
|
crl = x509_crl_get(url);
|
||||||
|
OPENSSL_free(url);
|
||||||
|
if (!crl && !ctx->options->crlfile) {
|
||||||
|
printf("Use the \"-CRLfile\" option to add one or more CRLs in PEM format.\n\n");
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif /* ENABLE_CURL */
|
||||||
|
if (p7->d.sign->crl || crl) {
|
||||||
|
crls = x509_crl_list_get(p7, crl);
|
||||||
|
if (!crls) {
|
||||||
|
printf("Failed to use CRL distribution point\n");
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
}
|
||||||
if (ctx->options->crlfile || crls) {
|
if (ctx->options->crlfile || crls) {
|
||||||
STACK_OF(X509) *chain = p7->d.sign->cert;
|
STACK_OF(X509) *chain = p7->d.sign->cert;
|
||||||
int crlok = verify_crl(ctx->options->cafile, ctx->options->crlfile,
|
int crlok = verify_crl(ctx->options->cafile, ctx->options->crlfile,
|
||||||
crls, signer, chain);
|
crls, signer, chain);
|
||||||
|
sk_X509_CRL_pop_free(crls, X509_CRL_free);
|
||||||
printf("Signature CRL verification: %s\n", crlok ? "ok" : "failed");
|
printf("Signature CRL verification: %s\n", crlok ? "ok" : "failed");
|
||||||
if (!crlok)
|
if (!crlok)
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* check extended key usage flag XKU_CODE_SIGN */
|
/* check extended key usage flag XKU_CODE_SIGN */
|
||||||
if (!(X509_get_extended_key_usage(signer) & XKU_CODE_SIGN)) {
|
if (!(X509_get_extended_key_usage(signer) & XKU_CODE_SIGN)) {
|
||||||
printf("Unsupported Signer's certificate purpose XKU_CODE_SIGN\n");
|
printf("Unsupported Signer's certificate purpose XKU_CODE_SIGN\n");
|
||||||
@ -1880,7 +1996,6 @@ static int verify_signature(FILE_FORMAT_CTX *ctx, PKCS7 *p7)
|
|||||||
int leafok, verok;
|
int leafok, verok;
|
||||||
STACK_OF(X509) *signers;
|
STACK_OF(X509) *signers;
|
||||||
X509 *signer;
|
X509 *signer;
|
||||||
char *url;
|
|
||||||
CMS_ContentInfo *timestamp = NULL;
|
CMS_ContentInfo *timestamp = NULL;
|
||||||
time_t time;
|
time_t time;
|
||||||
|
|
||||||
@ -1914,11 +2029,6 @@ static int verify_signature(FILE_FORMAT_CTX *ctx, PKCS7 *p7)
|
|||||||
printf("TSA's certificates file: %s\n", ctx->options->tsa_cafile);
|
printf("TSA's certificates file: %s\n", ctx->options->tsa_cafile);
|
||||||
if (ctx->options->tsa_crlfile)
|
if (ctx->options->tsa_crlfile)
|
||||||
printf("TSA's CRL file: %s\n", ctx->options->tsa_crlfile);
|
printf("TSA's CRL file: %s\n", ctx->options->tsa_crlfile);
|
||||||
url = clrdp_url_get_x509(signer);
|
|
||||||
if (url) {
|
|
||||||
printf("CRL distribution point: %s\n", url);
|
|
||||||
OPENSSL_free(url);
|
|
||||||
}
|
|
||||||
if (timestamp) {
|
if (timestamp) {
|
||||||
if (ctx->options->ignore_timestamp) {
|
if (ctx->options->ignore_timestamp) {
|
||||||
printf("\nTimestamp Server Signature verification is disabled\n\n");
|
printf("\nTimestamp Server Signature verification is disabled\n\n");
|
||||||
|
Loading…
x
Reference in New Issue
Block a user